Navegação estrutural

Federal Government

During Fiscal Year 2015, US-CERT processed more than 75,000 cybersecurity incidents reported by CFO Act government agencies, up from the more than 67,000 incidents reported in FY 2014, and the White House has made cybersecurity a top government-wide priority.

Insider-implemented breaches, such as those by Edward Snowden and Bradley Manning can not only severely cripple the ability of Federal agencies to achieve their objectives, but can also have a chilling effect on Federal professional and administrative careers.

Stolen Credentials

While insider threats persist, external threats are becoming more menacing and sophisticated. Advanced persistent threats, or APTs, blur the line between insider and external threats by allowing external adversaries to steal the user credentials required to bypass perimeter defenses and act as insiders. Due to their sophistication and required resources, APTs are often attributed to nation-states and other highly organized entities.

The Need for Compliance

As cybersecurity threats have proliferated and computer technology has advanced, government data security compliance has become increasingly complex.

The government mandates encryption, and major government security compliance regulations such as FISMA, NIST 800-53, FIPS (up to level 3), and Common Criteria need to be part of the any government data-security solution. And, as data moves to the cloud, government agencies need to comply with FedRAMP. Finally, depending on the government agency, HIPAA-HITECH and PCI DSS may also be important.

The Thales e-Security Solution

Vormetric’s data security solutions address all these issues and truly secure sensitive data for Federal government agencies working in the Civilian, Defense and Intelligence sectors through enabling an enterprise-level data at rest security strategy that is:

Effective

Highly compliant to government mandates

Quick to install

Easy to use

Easy to scale

Cost effective

Our Customer List

Thales e-Security provides government data security solutions to members of the US Intelligence Community, The U.S. National Laboratories, Health and Human Services and many other U.S. Federal Agencies and Departments.

Seventeen of the Fortune 30 rely on Thales eSecurity’s data security technology as do more than 1,500 customers in 22 countries across a broad range of industries including healthcare, retail, consumer goods, manufacturing, banking, insurance and cloud service providers. And, industry partners including IBM and Symantec market OEM solutions that incorporate Vormetric product technology.

Research and Whitepapers : Addressing continuous diagnostics and mitigation requirements

Congress established the Continuous Diagnostics and Mitigation program (CDM) to provide a strong, consistent cyber defense designed to protect more than 70 civilian agency networks. With the Vormetric data Security Platform, agencies can take a comprehensive, organization-wide approach to protecting data in support of CDM. The platform offers a number of capabilities that either comply with or exceed CDM requirements including:

Encryption and key management

Access controls

Multi-tenant support

Privileged user controls

Security intelligence

Download this paper to learn more about these capabilities and how they directly map to CDM requirements.

Solution Brief : Secure Multi-Tenancy

Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers and secure enclaves. Each customer is called a tenant.* Customers use it to gain investment efficiencies, secure stability, and isolation of security zones within a single High Availability architecture.

Vormetric is our standard. Whenever an encryption solution is needed, the answer is always, ‘let’s start with Vormetric.Damian McDonaldVice President of Global Information Security, Becton, Dickinson and Company

There is absolutely no noticeable impact on the performance or usability of applications. I am very excited at how easy the solution is to deploy and it has always performed flawlessly.Christian MuusDirector of Security for Teleperformance EMEA

Implementing Vormetric has given our own clients an added level of confidence in the relationship they have with us; they know we’re serious about taking care of their data.Audley Deansenior director of Information Security,BMC Software

Vormetric’s approach of coupling access control with encryption is a very powerful combination. We use it to demonstrate to clients our commitment to preserving the security and integrity of their test cases, data and designs.David VargasInformation Security ArchitectCadence Design Systems

My concern with encryption was the overhead on user and application performance. With Vormetric, people have no idea it’s even running.Karl MudraCIODelta Dental of Missouri

The Vormetric solution not only solved all of our encryption needs but alleviated any fears of the complexity and overhead of managing the environment once it was in place.Joseph Johnson,chief information security officer CHS

As a global payment solutions and commerce enablement leader, Verifone’s strategy is to develop and deploy “best in class” payment solutions and services that meet or exceed global security standards and help our clients securely accept electronic payments across all channels of commerce. We… Joe Majka,Chief Security Officer

Thales provided the expertise needed to design and implement a tailored, secure VoIP solutionThe Thales team helped us to develop and implement a process that protects our customers’ calls and our company from counterfeiting.Marek Dutkiewicz,Director of Product Management